CVE-2025-64094: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dnnsoftware Dnn.Platform
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 10.1.1, sanitization of the content of uploaded SVG files was not covering all possible XSS scenarios. This vulnerability exists because of an incomplete fix for CVE-2025-48378. This vulnerability is fixed in 10.1.1.
AI Analysis
Technical Summary
CVE-2025-64094 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the Dnn.Platform content management system (CMS) prior to version 10.1.1. DNN, formerly known as DotNetNuke, is an open-source CMS built on the Microsoft technology stack, widely used for web content management. The vulnerability stems from insufficient sanitization of SVG (Scalable Vector Graphics) file content uploaded to the platform. SVG files can contain embedded scripts or malicious payloads if not properly sanitized. Although a previous vulnerability (CVE-2025-48378) addressed some XSS vectors related to SVG uploads, the fix was incomplete, leaving residual attack vectors exploitable in versions before 10.1.1. An attacker with limited privileges can upload a crafted SVG file containing malicious JavaScript code. When other users or administrators view the affected content, the embedded script executes in their browsers under the context of the vulnerable site. This can lead to theft of session cookies, unauthorized actions, or redirection to malicious sites. The CVSS v3.1 base score is 6.4, reflecting a medium severity level with network attack vector, low attack complexity, and no user interaction required. The vulnerability impacts confidentiality and integrity but does not affect availability. No public exploits have been reported yet, but the presence of an incomplete fix suggests potential for future exploitation. The vulnerability is fixed in Dnn.Platform version 10.1.1, which includes improved sanitization routines for SVG content to neutralize all known XSS attack vectors.
Potential Impact
For European organizations using Dnn.Platform versions prior to 10.1.1, this vulnerability poses a significant risk to web application security. Successful exploitation can lead to unauthorized script execution in users' browsers, enabling session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. This compromises the confidentiality and integrity of sensitive data managed through the CMS. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on DNN for public-facing or internal portals are particularly at risk. The vulnerability could be exploited to target employees or customers, potentially leading to broader network compromise or reputational damage. Since the attack requires only limited privileges to upload malicious SVG files, insider threats or compromised accounts could facilitate exploitation. The lack of user interaction requirement increases the risk of automated or widespread attacks once exploit code becomes available. Although no known exploits are currently in the wild, the incomplete prior fix and medium CVSS score indicate a moderate likelihood of future exploitation attempts. European entities should consider this vulnerability a priority for patching to maintain compliance with data protection regulations and cybersecurity best practices.
Mitigation Recommendations
1. Upgrade all Dnn.Platform installations to version 10.1.1 or later, where the vulnerability is fully patched. 2. Implement strict file upload controls to restrict SVG uploads only to trusted users or disable SVG uploads if not required. 3. Employ additional server-side validation and sanitization of SVG files using specialized libraries that comprehensively neutralize embedded scripts. 4. Monitor web server and application logs for unusual upload activity or access patterns indicative of exploitation attempts. 5. Use Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of potential XSS attacks. 6. Educate administrators and content managers about the risks of uploading untrusted SVG content. 7. Conduct regular security assessments and penetration testing focused on file upload functionalities. 8. Implement multi-factor authentication and least privilege principles to reduce the risk of compromised accounts being used to upload malicious files. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential breaches.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-64094: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dnnsoftware Dnn.Platform
Description
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 10.1.1, sanitization of the content of uploaded SVG files was not covering all possible XSS scenarios. This vulnerability exists because of an incomplete fix for CVE-2025-48378. This vulnerability is fixed in 10.1.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-64094 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the Dnn.Platform content management system (CMS) prior to version 10.1.1. DNN, formerly known as DotNetNuke, is an open-source CMS built on the Microsoft technology stack, widely used for web content management. The vulnerability stems from insufficient sanitization of SVG (Scalable Vector Graphics) file content uploaded to the platform. SVG files can contain embedded scripts or malicious payloads if not properly sanitized. Although a previous vulnerability (CVE-2025-48378) addressed some XSS vectors related to SVG uploads, the fix was incomplete, leaving residual attack vectors exploitable in versions before 10.1.1. An attacker with limited privileges can upload a crafted SVG file containing malicious JavaScript code. When other users or administrators view the affected content, the embedded script executes in their browsers under the context of the vulnerable site. This can lead to theft of session cookies, unauthorized actions, or redirection to malicious sites. The CVSS v3.1 base score is 6.4, reflecting a medium severity level with network attack vector, low attack complexity, and no user interaction required. The vulnerability impacts confidentiality and integrity but does not affect availability. No public exploits have been reported yet, but the presence of an incomplete fix suggests potential for future exploitation. The vulnerability is fixed in Dnn.Platform version 10.1.1, which includes improved sanitization routines for SVG content to neutralize all known XSS attack vectors.
Potential Impact
For European organizations using Dnn.Platform versions prior to 10.1.1, this vulnerability poses a significant risk to web application security. Successful exploitation can lead to unauthorized script execution in users' browsers, enabling session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. This compromises the confidentiality and integrity of sensitive data managed through the CMS. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on DNN for public-facing or internal portals are particularly at risk. The vulnerability could be exploited to target employees or customers, potentially leading to broader network compromise or reputational damage. Since the attack requires only limited privileges to upload malicious SVG files, insider threats or compromised accounts could facilitate exploitation. The lack of user interaction requirement increases the risk of automated or widespread attacks once exploit code becomes available. Although no known exploits are currently in the wild, the incomplete prior fix and medium CVSS score indicate a moderate likelihood of future exploitation attempts. European entities should consider this vulnerability a priority for patching to maintain compliance with data protection regulations and cybersecurity best practices.
Mitigation Recommendations
1. Upgrade all Dnn.Platform installations to version 10.1.1 or later, where the vulnerability is fully patched. 2. Implement strict file upload controls to restrict SVG uploads only to trusted users or disable SVG uploads if not required. 3. Employ additional server-side validation and sanitization of SVG files using specialized libraries that comprehensively neutralize embedded scripts. 4. Monitor web server and application logs for unusual upload activity or access patterns indicative of exploitation attempts. 5. Use Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of potential XSS attacks. 6. Educate administrators and content managers about the risks of uploading untrusted SVG content. 7. Conduct regular security assessments and penetration testing focused on file upload functionalities. 8. Implement multi-factor authentication and least privilege principles to reduce the risk of compromised accounts being used to upload malicious files. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential breaches.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-27T15:26:14.125Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6901419f608506ea438f86a6
Added to database: 10/28/2025, 10:20:15 PM
Last enriched: 10/28/2025, 10:20:32 PM
Last updated: 10/29/2025, 12:11:21 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-4665: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WordPress Contact Form 7 Database Addon CFDB7 By Arshid CFDB7
CriticalCVE-2025-64095: CWE-434: Unrestricted Upload of File with Dangerous Type in dnnsoftware Dnn.Platform
CriticalCVE-2025-62800: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jlowin fastmcp
MediumCVE-2025-62802: CWE-1188: Insecure Default Initialization of Resource in dnnsoftware Dnn.Platform
MediumCVE-2025-62801: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jlowin fastmcp
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.